This chapter explains the Cloud Foundry security model using the User Account and Authorization service (UAA) and how SAP HANA XSA implements it. The OAuth protocol and its vital role within XSA are part of this chapter. HDI containers along with cross-schema access on classic objects are explained along with other development artifacts such as synonyms, and grants are addressed as they are vital to the cross-schema development scenarios that are present in any enterprise who is ready to face the implementation of development in an XSA environment.
2. Security model in XSA
Get Microservices in SAP HANA XSA: A Guide to REST APIs Using Node.js now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.